Zum Hauptinhalt springen

Showing 1–4 of 4 results for author: van der Veen, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.10603  [pdf, other

    cs.CR cs.AR

    Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications

    Authors: Hasan Hassan, Yahya Can Tugrul, Jeremie S. Kim, Victor van der Veen, Kaveh Razavi, Onur Mutlu

    Abstract: The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips rely on undocumented, proprietary, on-die mitigations, commonly known as Target Row Refresh (TRR). At a high level, TRR detects and refreshes potential RowHammer-victim rows, but its exact implementations are not openly disclosed… ▽ More

    Submitted 22 October, 2022; v1 submitted 20 October, 2021; originally announced October 2021.

    Comments: This work is to appear at the 54th IEEE/ACM International Symposium on Microarchitecture (MICRO 2021)

  2. arXiv:2007.03302  [pdf, ps, other

    cs.CR

    VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

    Authors: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos

    Abstract: Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers can potentially hijack and in practice, vtable hijacking is one of the most important attack vector for C++ binaries. In this paper, we present VTab… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Published in Annual Computer Security Applications Conference (ACSAC'19)

  3. arXiv:2004.01807  [pdf, other

    cs.CR

    TRRespass: Exploiting the Many Sides of Target Row Refresh

    Authors: Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi

    Abstract: After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what was meant to be the definitive hardware solution against the RowHammer problem: Target Row Refresh (TRR). A common belief among practitioners is that, for the latest generation of DDR4 systems that are protected by TRR, RowHammer is no longer an issue in practice. However, in reality, very little is… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 16 pages, 16 figures, in proceedings IEEE S&P 2020

    ACM Class: B.8.1

  4. arXiv:1410.7749  [pdf

    cs.CR

    Enter Sandbox: Android Sandbox Comparison

    Authors: Sebastian Neuner, Victor van der Veen, Martina Lindorfer, Markus Huber, Georg Merzdovnik, Martin Mulazzani, Edgar Weippl

    Abstract: Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google's mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number of static and dynamic code analysis platforms for analyzin… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674)

    Report number: MoST/2014/07